what is '1000 projects'?
'fullinterview.com' is a educational content website dedicated to finding and realizing final year projects for btech, be, mtech, mca students, here you can search, find your projects and get guidance from experts the below are the different technological projects.visual Studio projects .net projects, asp projects, c & ds projects, c++ projects (all), cold fusion projects, delphi projects, java projects, perl projects, php projects, sql projects, vc++ projects, visual basic projects.
how it works?
well, everything on this site is submitted by the student and professional community. after you submit your project, it is being verified and approved by our administrator. after approval, other people can read/discuss it, save to favorites.more number of projects?
here you can find morethan 1000 projects on different technologies, if u want to get more projects please visit our sister sites www.fullinterview.com & Chetanasprojects.com
Category Articles
Which is the program which determines whether a transaction should be restarted ?
Added on Fri, Nov 27, 2009
DTB Read More
What is EXEC CICS RETRIEVE ?
Added on Wed, Nov 25, 2009
Used by STARTed tasks to get the parameters passed to them. Read More
How do you protect a field from being overlaid?What is the attribute byte?
Added on Thu, Nov 26, 2009
Defines the display/transmission of field most cases is an output field from the program Read More
When you get the Map-fail condition? What is the abend code of it?
Added on Fri, Nov 27, 2009
This occurs if the data to be mapped has the length of
zero, or contains no SBA code. This usually happens when the user
presses the ENTER key with out typing data if no FSET is specified in
DFHMDF macros. Read More
What is the difference between the Attention Identifier & Handle aid commands?How they are coded in the CICS Program?
Added on Fri, Nov 27, 2009
AID indicates which method the terminal operator has
used to initiate the transfer of information from the terminal device to
CICS. Some examples of AID are PF keys, Enter key and Clear key EIBAID
field in EIB contains the AID code of the most... Read More
How do you delete Item 3 in a five-item TSQ ?
Added on Thu, Nov 26, 2009
You can’t--at least not directly. Options, none of them
good, include: 1) adding a logical-delete flag to the contents of each
item; 2) moving item 4 to 3 and 5 to 4 and initializing item 5, all thru
rewrites; this is a variant on 1; 3)... Read More
What is DTB ?
Added on Fri, Nov 27, 2009
Dynamic Transaction Back-out. A process to recover
recoverable resources based on information stored in the Dynamic Log.
DTB stands for Direct Table Based in mainframe, actually lanuge called
DTB/COBOL Read More
What is BMS ?
Added on Thu, Nov 26, 2009
BMS is Basic Map Support; it allows you to code assembler level programs to define screens. Read More
What is the difference between a PF key & a PA key ?
Added on Fri, Nov 27, 2009
PF keys wake up the task and transmit modified data, PA keys only wake up the task Read More
Why is a TERM ID recommended in naming a TSQ?
Added on Thu, Nov 26, 2009
In order to avoid confusion and to maintain data
security, a strict naming convention for QID will be required in the
installation. Moreover, for a terminal-dependent task (e.g.,
pseudo-conversational task), the terminal id should be included in... Read More
What is the difference between using the READ command with INTO option and SET option?
Added on Thu, Nov 26, 2009
When we use INTO option with the READ command the data
content of the record will be moved into the specified field defined in
the Working Storage Section of the program. When we use SET option with
the READcommand , CICS sets the address pointer to... Read More
What is the difference between CICS Program Control Table (PCT) and CICS Processing Program Table (PPT) ?
Added on Fri, Nov 27, 2009
PCT contains a list of valid transaction ID. Each
transaction ID is paired with the name of the program ,CICS will load
and execute when the transaction is invoked. On the other hand, PPT
indicates each program’s location which pertains to a... Read More
How To Set MDT(Modified Data Tag) Thru Application Program?(Dynamically).
Added on Fri, Nov 27, 2009
You have to move the following macro DFHBMFSE to the Attribute field of that particular Variable. Read More
How a CICS Transaction be initiated?
Added on Wed, Nov 25, 2009
Involving CICS Control programs and Control tables. a.
Trans-id entered in terminal b. TCP with TCT recognizes incoming
data c. SCP acquires the storage for the Terminal Input-Output Area
(TIOA) d. KCP prepares control data for this task e.KCP,... Read More
What is the difference between FSET and FRSET ?
Added on Thu, Nov 26, 2009
FSET specifies that the modified data tag should be
turned on before the map is sent to the screen. FRSET turns off the
attribute byte; it’s used to transmit only changed data from the
terminal. Read More
Explain the difference among the EXEC LINK, EXEC XCTL and Cobol II static call statements in CICS?
Added on Fri, Nov 27, 2009
COBOL II allows for static calls which are more efficient than the LINK instruction which establishes a new run- unit. Read More
CICS’
system services provides an interface between CICS and the operating
system and carries out the functions like loading and releasing of
application programs, acquiring and freeing of storage , task
scheduling, etc (True or False). ?
Added on Fri, Nov 27, 2009
True Read More
In
the conversational mode the system waits for the user to enter his
response and then press an attention key, and while waiting the
resources are held by the program or task. So conversational mode of
programming is inefficient (True or False)?
Added on Fri, Nov 27, 2009
True Read More
What is the size of commarea?
Added on Wed, Nov 25, 2009
The default commarea size is 65k. Read More
What tables must be updated when adding a new transaction and program ?
Added on Thu, Nov 26, 2009
At a bare minimum the Program Control Table ( PCT) and Program Processing Table (PPT) must be updated. Read More
Specify CICS transaction initiation process. (From the perspective of CICS control programs and control tables.)?
Added on Thu, Nov 26, 2009
TCP places data in TIOA and corresponding entry into TCT.
KCP acquires the transaction identifier from TIOA and verifies if it is
present in PCT. SCP acquires Storage in Task Control Area (TCA), in
which KCP prepares control data for the task. KCP... Read More
Into what fields will the date and time values be moved after execution of the above command?
Added on Thu, Nov 26, 2009
EIBDATE & EIBTIME. Read More
Mention the option used in the CICS READ command to gain accessibility directly to the file I/O area. (Assume COBOL-II). ?
Added on Thu, Nov 26, 2009
SET(ADDRESS OF LINKAGE-AREA). Read More
Code
the related portions of CICS/COBOL-I programs to gain addressability to
TWA area assigned to a particular task. Assume that the size of TWA
area is 300 bytes. What are the advantages if COBOL-II is used in the
place of COBOLCode the above requir
Added on Thu, Nov 26, 2009
COBOL- II PROGRAM LINKAGE SECTION. 01 PARMLIST. 02 FILLER
PIC S9(8) COMP. 02 TWA-PTR S(98) COMP. 01 TWA-DATA-LAYOUT. 02 DATA-AREA
PIC X(300). PROCEDURE DIVISION. ???. EXEC CICS ADDRESS TWA(TWA-PTR)
END-EXEC SERVISE RELOAD TWA-DATA-LAYOUT. COBOL- II... Read More
What is the function of DFHMDF BMS macro?
Added on Thu, Nov 26, 2009
The DFHMDF macro defines fields, literal, and characteristics of a field. Read More
What is the meaning of BMS length of field = 0?
Added on Fri, Nov 27, 2009
Data was not entered in the field Read More
What do you do if you do not want characters entered by the user to be folded to uppercase ?
Added on Fri, Nov 27, 2009
Use ASIS option on RECEIVE Read More
What is the difference between the LINK, XCTL & CALL statements?
Added on Fri, Nov 27, 2009
XCTL passes control to another program, both programs
are on the same logical level. When passed program execution ends,
control is NOT passed back to main program. LINK passes control to
another program, but when passed program ends, control will... Read More
For protecting a transaction using the transaction security function, the two things that must be done are?
Added on Fri, Nov 27, 2009
1. in the SNT entry of the user who you which to allow to
access a protected transaction, specify SCTKEY=n 2. In the PCT entry
of the transactions that you wish to protect specify the TRANSEC=n.
(True or False) True Read More
What CICS command are used to read a VSAM KSDS sequentially in ascending order?
Added on Wed, Nov 25, 2009
First issue a STARTBR(start browse), which will position
the browse at the desired record. Retrieve records by using subsequent
READNEXT commands. Indicate the end of sequential processing with the
ENDBR command. If the generic key is specified in... Read More
How can you accomplish breakpoint in intertest?
Added on Thu, Nov 26, 2009
U-for unconditional breakpoint, C-for conditional breakpoint, and A-for automatic breakpoint Read More
What are the CICS commands associated with transient data queue processing ?
Added on Thu, Nov 26, 2009
WRITEQ TD, READQ TD, DELETEQ TD, ENQ and DEQ. Read More
What is the CICS command that gives the length of TWA area?
Added on Thu, Nov 26, 2009
EXEC CICS ASSIGN TWALENG(data-value) END-EXEC. Read More
How do you set the MDT option to ?ON? status, even if data is not entered?
Added on Thu, Nov 26, 2009
Mention FSET option in DFHMDF or set it dynamically in the program using FIELD+A attribute field. Read More
How can you start a CICS transaction other than by keying the Transaction ID at the terminal?
Added on Thu, Nov 26, 2009
By coding an EXEC CICS START in the application program
By coding the trans id and a trigger level on the DCT table By coding
the trans id in the EXEC CICS RETURN command By associating an attention
key with the Program Control Table By embedding the... Read More
What happens to resources supplied to a transaction when an XCTL command is executed?
Added on Thu, Nov 26, 2009
With an XCTL, the working storage and the procedure
division of the program issuing the XCTL are released. The I/O areas,
the GETMAIN areas, and the chained Linkage Section areas (Commarea from a
higher level) remain. All existing locks and queues... Read More
What is the difference between the INTO and the SET option in the EXEC CICS RECEIVE MAP command?
Added on Thu, Nov 26, 2009
The INTO option moves the information in the TIOA into
the reserved specified area, while the SET option simply returns the
address of the TIOA to the specified BLL cell or ?address-of? a
linkage-section. Read More
What is MDT?What are FSET, FRSET ?
Added on Fri, Nov 27, 2009
Modified Data Tag Bit in the attribute byte indicating
modification of field on screen Happens on an input operation. FSET
Sets MDT on to ensure field is transmitted Happens on an output
operation FRSET Resets MDT Until this happens, field... Read More
Can you simply check if length = 0 for checking if a field was modified?
Added on Fri, Nov 27, 2009
not if ERASE EOF was used Read More
When
you compile a CICS program, the (pre)compiler puts an extra chunk of
code Where does it get included and that is it called? What is its
length?
Added on Fri, Nov 27, 2009
DFHEIBLK, DFHCOMMAREA Read More
Explain the term ?MRO? (Multi Region Operation)?
Added on Fri, Nov 27, 2009
MRO is the mechanism by which different CICS address spaces with in the same CPU can communicate and share resources. Read More
Name some important fields in the EIB block ?
Added on Fri, Nov 27, 2009
EIBRESP, EIBCALEN, EIBRRCDE, EIBTASK, EIBDATE, EIBTIME. Read More
What is the difference between a Symbolic map and Physical map ?
Added on Fri, Nov 27, 2009
SYMBOLIC MAP IS USED BY USER AND PHYSICAL MAP IS USED BY SYSTEM Read More
How is the stopper byte different from an auto skip byte ?
Added on Fri, Nov 27, 2009
STOPPER command will stop after completing its field ,
whereas AUTOSKIP command Will skip to next unprotected field after
completing its field. Read More
If you use the OPTIMIZE compiler option the size of the program can be reduced by 5 to 10%(True or False).?
Added on Fri, Nov 27, 2009
True Read More
What will happen, if an out-of-range or negative value is specified in the LENGTH option of the SEND command?
Added on Fri, Nov 27, 2009
The OUTRAGE condition will be set Read More
If no exception handling is provided in the program, what will happen ?
Added on Fri, Nov 27, 2009
CICS will take the default action specified for the condition Read More
How many exceptional condition can be given in a HANDLE CONDITION?
Added on Fri, Nov 27, 2009
Max. of 12 exceptional conditions can be given in a single HANDLE CONDITION. Read More
WHAT IS DFHEIBLK?
Added on Wed, Nov 25, 2009
DFHEIBLK is Execute Interface Block. It is placed in the
linkage section automatically by CICS translator program. It must be the
first entry in linkage section. CICS places values prior to giving
control to the program and we can find almost any... Read More
What information can be obtained from the EIBRCODE?
Added on Wed, Nov 25, 2009
The EIBRCODE tells the application program if the last CICS command was executed successfully and, if not, why not. Read More
How many ways can we initiate a CICS Transaction? What are they?
Added on Wed, Nov 25, 2009
A. Keying in the Transaction-id at the terminal B. By
coding an EXEC CICS START in the application program C. By coding the
transaction id and trigger level in the DCT (Automatic Task Initiation)
D. By coding the transaction id in the EXEC CICS... Read More
If EIBCALLEN =0 , then what will happen?
Added on Wed, Nov 25, 2009
No COMMAREA was sent by the calling program. Read More
How would you release control of the record in a READ for UPDATE?
Added on Wed, Nov 25, 2009
By issuing a REWRITE,DELETE, or UNLOCK command or by ending the task. Read More
The EIB field which gives the last CICS command executed is ?
Added on Wed, Nov 25, 2009
EIBRCODE Read More
What is the COMMAREA(communications area)?
Added on Wed, Nov 25, 2009
An area used to transfer data between different programs
or between subsequent executions of the same program. Needs to be
defined in the Linkage Section. 1 what happens internally when a trans
Id is entered in the CICS region? 2 What are all the... Read More
Which of the following statements correctly describe the syntax of CICS command language?
Added on Wed, Nov 25, 2009
If an EXEC CICS command must be continued onto a second
line a hyphen (-) must be coded in column 7 of the continued line. B).
If an EXEC CICS command must be continued onto a second line an ’X’ must
be coded in column 72 of each line to... Read More
What is the EIB (execute interface block) ?
Added on Wed, Nov 25, 2009
The execute interface block lets the program communicate
with the execute interface program, which processes CICS commands. It
contains terminal id, time of day and response codes. Read More
Which type of TDQ is read destructive?
Added on Wed, Nov 25, 2009
Intrapartition TDQ is read destructive. extra partition tdq is not read destructive. Read More
What is the function of the EXEC CICS HANDLE CONDITION command?
Added on Wed, Nov 25, 2009
To specify the paragraph or program label to which control is to be passed if the ?handle condition? occurs. Read More
What are the differences between Temporary Storage Queue (TSQ) and Transient Data Queue (TDQ).?
Added on Wed, Nov 25, 2009
Temporary Storage Queue names are dynamically defined in
the application program, while TDQs must first be defined in the DCT
(Destination Control Table). When a TDQ contains certain amount of
records (Trigger level), a CICS transaction can be... Read More
A CICS program ABENDS with an ASRA ABEND code. What is its meaning?
Added on Wed, Nov 25, 2009
A link was issued to a program whose name does not exist
in the PPT (Program Processing Table). B) A program attempted to use a
map that is not defined in the PCT (Program Control Table). C) A
security violation has occurred. The operator is not... Read More
How can you accomplish breakpoint in intertest tool?
Added on Wed, Nov 25, 2009
U-for unconditional brake point, C-for conditional brake point, and A-for automatic brake point. Read More
What is the difference between LINK and XCTL ?
Added on Wed, Nov 25, 2009
The XCTL command passes control to another program, but
the resources requested by the first program may still be allocated. A
task does not end until a RETURN statement is executed. While in LINK
command, program control resumes its instruction... Read More
What is the maximum number of exceptions that can be specified with a single HANDLE CONDITION command in CICS ?
Added on Wed, Nov 25, 2009
SIXTEEN (16) Read More
Which is the command that is used to dump the main storage areas related to a task?
Added on Wed, Nov 25, 2009
DUMP Read More
What is the CICS command that is used to copy a screen image of a terminal into another terminal?
Added on Wed, Nov 25, 2009
ISSUE COPY Read More
What is the difference between a RETURN with TRANSID and XCTL ?
Added on Wed, Nov 25, 2009
For example prog. A is issuing REUTRN with TRANSID to
prog B. Prog A. is issuing XCTL to prog B. In RETURN with TRANSID the
control goes to the CICS region and the user have to transfer the
control to prog. B by pressing any of the AID KEYS. In XCTL... Read More
The READ command with INTO option will read the record specified into the data area specified (True or false).?
Added on Wed, Nov 25, 2009
False Read More
Name some of the common tables in CICS and their usage ?
Added on Wed, Nov 25, 2009
PCT Program Control Table - defines each transaction,
containing a list of valid transaction identifiers (transid) where each
transaction is paired with its matching program; PPT Program Processing
Table - contains a list of valid program names and... Read More
Name some common CICS service programs and explain their usage.?
Added on Thu, Nov 26, 2009
Terminal Control, File Control, Task Control, Storage
Control, etc. Each CICS services program controls the usage and status
for its resource (file, terminal, etc) within the CICS region. Read More
What is meant by program reentrance ?
Added on Thu, Nov 26, 2009
A program is considered reentrant if more than one task
can execute the code without interfering with the other tasks’
execution. Read More
What is Communication Area?
Added on Thu, Nov 26, 2009
Communication Area is used to pass data between the program or between the task. Read More
What is a transid and explain the system transid CEMT. ?
Added on Thu, Nov 26, 2009
Transid is a transaction identifier, a four character
code used to invoke a CICS task. CEMT is the master terminal
transaction that lets you display and change the status of resources -
it is the primary CICS service transaction. Read More
What is the common work area (CWA) ?
Added on Thu, Nov 26, 2009
The common work area is a storage area that can be accessed by any task in a CICS system. Read More
How do you access storage outside your CICS program ?
Added on Thu, Nov 26, 2009
In COBOL storage was accessed via BLL cells using the SET
option of ADDRESS commands. In COBOL II the special register, ADDRESS
OF lets you reference the address of any Linkage Section field Read More
How
does COBOL II and CICS release 1.7 provide for exceptional conditions
and how does that differ from VS COBOL and earlier CICS releases ?
Added on Thu, Nov 26, 2009
VS COBOL used the HANDLE CONDITION command to name
routines to pass program control when exceptional conditions were
encountered. COBOL II and CICS release 1.7 introduced the RESP option on
many CICS commands. Read More
How do you control cursor positioning ?
Added on Thu, Nov 26, 2009
It’s controlled by the CURSOR option of the SEND MAP command using a direct (0 through 1919) or symbolic value. Read More
How do you invoke other programs What are the pros and cons of each method. ?
Added on Thu, Nov 26, 2009
There are three ways: 1). use a COBOL II CALL statement
to invoke a subprogram. This method is transparent to CICS, which sees
only the one load module. 2). an EXEC LINK is similar to a call; it
invokes a separate CICS program and ends with a RETURN... Read More
What CICS command would you use to read a VSAM KSDS sequentially in ascending order?
Added on Thu, Nov 26, 2009
First issue a STARTBR(start browse), which will position
the browse at the desired record. Retrieve records by using subsequent
READNEXT commands. Indicate the end of sequential processing with the
ENDBR command. If the generic key is specified in... Read More
Explain the difference among the EXEC LINK, EXEC XCTL and Cobol II static call statements in CICS. ?
Added on Thu, Nov 26, 2009
COBOL II allows for static calls which are more efficient than the LINK instruction which establishes a new run-unit. Read More
What is an ASRA ?
Added on Thu, Nov 26, 2009
An ASRA is the CICS interrupt code, the equivalent of an MVS abend code. Read More
What is transient data ?
Added on Thu, Nov 26, 2009
Transient data provides CICS programs with a simple
method for sequential processing, often used to produce output for 3270
printers. Read More
What are the two types of transient data queues ?
Added on Thu, Nov 26, 2009
They are intrapartition, which can only be accessed from
within CICS and extrapartition, which are typically used to collect data
online, but process it in a batch environment. Read More
Where are transient data sets defined to CICS ?
Added on Thu, Nov 26, 2009
They are defined in the destination control table (DCT). Read More
Name some commands used for CICS file browsing. ?
Added on Thu, Nov 26, 2009
STARTBR, READNEXT, READPREV, ENDBR and RESETBR. Read More
What is the meaning of the SYNCPOINT command ?
Added on Thu, Nov 26, 2009
SYNCPOINT without the ROLLBACK option makes all updates
to protected resources permanent, with the ROLLBACK option it reverses
all updates. Read More
What do the terms locality of reference and working set mean ?
Added on Thu, Nov 26, 2009
They refer to CICS efficiency techniques. Locality of
reference requires that the application program should consistently
reference instructions and data within a relatively small number of
pages. The working set is the number of program pages... Read More
What is a cursor in CICS sql processing. ?
Added on Thu, Nov 26, 2009
A cursor is a pointer that identifies one row in a sql results table as the current row Read More
What are the DB2 steps required to migrate a CICS DB2 program from source code to load module ?
Added on Thu, Nov 26, 2009
A DB2 precompiler processes some sql statements and
converts others. It creates a data base request module (DBRM) for the
binding step. The bind process uses the DBRM to create an application
plan, which specifies the techniques DB2 will use to... Read More
What is DCLGEN ?
Added on Thu, Nov 26, 2009
DCLGEN stands for declarations generator; it is a facility to generate DB2 sql data structures in COBOL or PL/I programs. Read More
Name some translator and compile options and explain their meaning. ?
Added on Thu, Nov 26, 2009
For translator SOURCE option prints the program listing,
DEBUG enables EDF and COBOL2 alerts the system to use the COBOL II
compiler. For the compiler XREF prints a sorted data cross reference and
FDUMP prints a formatted dump if the program abends. Read More
What is CEDF ?
Added on Thu, Nov 26, 2009
CEDF is the execute diagnostic facility that can be used for debugging CICS program Read More
What is a logical message in CICS ?
Added on Thu, Nov 26, 2009
A logical message is a single unit of output created by
SEND TEXT or SEND MAP commands. BMS collects the separate output from
each command and treats them as one entity. This technique may be used
to build CICS reports. Read More
what is the meaning of the ENQ and DEQ commands ?
Added on Thu, Nov 26, 2009
Neither command is exclusively a transient data command.
The ENQ command reserves any user defined resource for the specific
task. For enqueued transient data no other task will be able to write
records to it for as long as it is enqueued. DEQ... Read More
How do you get data from a task that began with a START command ?
Added on Thu, Nov 26, 2009
The RETRIEVE command is used to get data from a task that began with a START command. Read More
What is interval control and what are some of the CICS commands associated with it ?
Added on Thu, Nov 26, 2009
CICS interval control provides a variety of time-related
features - common commands are ASKTIME, FORMATTIME, START, RETRIEVE, and
CANCEL. Read More
What are the commands used to gain exclusive control over a resource (for Ex a Temporary storage queue.)?
Added on Thu, Nov 26, 2009
EXEC CICS ENQ EXEC CICS DEQ RESOURCE(QID) RESOURCE(QID) END-EXEC END-EXEC Read More
How
do you initiate another transaction.The transaction initiated should be
in a position to retrieve information pertaining to which transaction
has initiated it and from which terminal. (Code the required CICS
commands)?
Added on Thu, Nov 26, 2009
EXEC CICS START INTERVAL(hhmmss)/TIME(hhmmss)
TRANSID(?TRAN?) TERMID(?TRM1) FROM(data-area) LENGTH(data-value)
RTRANSID(EIBTRNID) RTERMID(EIBTRMID) END-EXEC EXEC CICS RETRIEVE
INTO(data-area) LENGTH(data-value) RTRANSID(data-name)
RTERMID(data-name)... Read More
Mention
the option (along with argument type) used in a CICS command to
retrieve the response code after execution of the command. ?
Added on Thu, Nov 26, 2009
RESP( S9(8) COM.) Read More
What?s the CICS command used to access current date and time?
Added on Thu, Nov 26, 2009
ASKTIME. Read More
ow to terminate an already issued DELAY command?
Added on Thu, Nov 26, 2009
EXEC CICS CANCEL REQID(id) END-EXEC Read More
How do you dynamically set the CURSOR position to a specific field?
Added on Thu, Nov 26, 2009
MOVE ?1 to FIELD+L field. Mention CURSOR option in the SEND command. Read More
Which option of the PCT entry is used to specify the PF key to be pressed for initiating a transaction?
Added on Thu, Nov 26, 2009
TASKREQ=PF1 Read More
Which command is used to release a record on which exclusive control is gained?
Added on Thu, Nov 26, 2009
EXEC CICS UNLOCK END-EXEC. Read More
What is the option specified in the read operation to gain multiple concurrent operations on the same dataset?
Added on Thu, Nov 26, 2009
REQID(value). Read More
What are the attribute values of Skipper and Stopper fields?
Added on Thu, Nov 26, 2009
ASKIP, PROT. Read More
What option is specified in the SEND command to send only the unnamed fields on to the screen?
Added on Thu, Nov 26, 2009
MAPONLY Read More
What is the most common way of building queue-id of a TSQ (Name the constituents of the Queue ID)?
Added on Thu, Nov 26, 2009
TERMID+TRANSACTION-ID. Read More
Which transient data queue supports ATI?
Added on Thu, Nov 26, 2009
INTRA- PARTITION Data queue. Read More
What does ?Pseudo Conversational? mean?
Added on Thu, Nov 26, 2009
The programming technique in which the task will not wait
for the end-user replies on the terminal. Terminating the task every
time the application needs a response from the user and specifying the
next transaction to be started when the end user... Read More
What is the function of the CICS translator?
Added on Thu, Nov 26, 2009
The CICS translator converts the EXEC CICS commands into
call statements for a specific programming language. There are CICS
translators for Assembler, COBOL, and PL/1. Read More
What is a resident program?
Added on Thu, Nov 26, 2009
A program or map loaded into the CICS nucleus so that it
is kept permanently in main storage and not deleted when CICS goes
?Short On Storage?. Read More
How many conditions can you include in a single HANDLE CONDITION command?
Added on Thu, Nov 26, 2009
No more than 16 in a single handle condition. If you need more, then you must code another HANDLE CONDITION command. Read More
What is the EXEC CICS HANDLE ABEND?
Added on Thu, Nov 26, 2009
It allows the establishing of an exit so cleanup
processing can be done in the event of abnormal task termination.Mainly
it is used for to prevent loop in exceptional condition . Read More
What is the difference between EXEC CICS HANDLE CONDTION and an EXEC CICS IGNORE command?
Added on Thu, Nov 26, 2009
A HANDLE CONDITION command creates a ?go-to? environment.
An IGNORE command does not create a go-to environment; instead, it
gives control back to the next sequential instruction following the
command causing the condition. They are opposites. Read More
What are the CICS commands available for program control?
Added on Thu, Nov 26, 2009
The following commands are available for the Program
Control services: LINK: To pass control to another program at the lower
level, expecting to be returned. XCTL: To pass control to another
program at the same level, not expecting to be returned.... Read More
How to establish dynamic cursor position on a map?
Added on Thu, Nov 26, 2009
We dynamically position a cursor through an application
program using a symbolic name of the symbolic map by placing -1 into the
field length field ( i.e., fieldname + L) of the field where you wish
to place thecursor. The SEND MAP command to be... Read More
How do you place the cursor on a particular position on the screen?
Added on Thu, Nov 26, 2009
Move -1 to the length attribute of the field and use the CURSOR option. Read More
What are the two outputs created as a result of generation of a map?
Added on Thu, Nov 26, 2009
The map copybook and the load module.
Two Outputs are generated from generation of map, one is Physical Map
that is load module of the given Map, and another one is Symbolic Map
that is copybook and used in the application... Read More
What is a mapset?
Added on Thu, Nov 26, 2009
A mapset is a collection of BMS maps link-edited together. Read More
What is the difference between physical map and symbolic map?
Added on Thu, Nov 26, 2009
The physical map is the load module and the symbolic map is the data structure Read More
How do you use extended attributes ?
Added on Thu, Nov 26, 2009
Define EXTATT=YES and the correct terminal type. Read More
What are the 3 working storage fields used for every field on the map?
Added on Thu, Nov 26, 2009
Length, attribute and input/output field Read More
What is the use of DSECT parameter in BMS?
Added on Thu, Nov 26, 2009
is the parameter to generate a symbolic map Read More
Do you receive the attribute byte in the symbolic map?
Added on Thu, Nov 26, 2009
On EOF yes Read More
How can the fact that EIBCALEN is equal to zeros be of use to an application programmer?
Added on Fri, Nov 27, 2009
When working in a pseudo-conversational mode, EIBCALEN
can be checked if it is equal to zero. A programmer can use this
condition as a way of determining first time usage(of the program). Read More
Which CICS system program is responsible for handling automatic task initialization?
Added on Fri, Nov 27, 2009
The Transient Data Program(TDP). Read More
In an on-line environment, how can you prevent more than one user from accessing the same Transient Data Queue at the same time?
Added on Fri, Nov 27, 2009
By issuing an EXEC CICS ENQ against the resource. When processing is completed, a DEQ should be executed. Read More
The
DFHCOMMAREA is used to pass information from one application to
another. What are some other ways that this function can be
accomplished?
Added on Fri, Nov 27, 2009
You can also pass information in the following ways. - By
using a temporary storage queue - By using an intrapartition TDQ - By
using the Task Work Area - By using TCTUA - Through a file Read More
Which CICS command must be issued by the application program in order to gain access to the Common Work Area(CWA)?
Added on Fri, Nov 27, 2009
EXEC CICS ADDRESS with CWA option Read More
In which CICS table would you specify the length of the TASK WORK AREA (TWA)?
Added on Fri, Nov 27, 2009
In the Program Control Table(PCT). Read More
What does the BUFFER option in RECEIVE mean ?
Added on Fri, Nov 27, 2009
Bring the entire datastream from the terminal buffer Read More
What is a deadlock?
Added on Fri, Nov 27, 2009
Deadlock (also known as a ?deadly embrace?) occurs when a
task is waiting for a resource held by another task which, in turn, is
waiting for a resources held by the first task. Read More
Explain the term Transaction routing?
Added on Fri, Nov 27, 2009
Transaction routing is a CICS mode of intercommunication
which allows a terminal connected to local CICS to execute another
transaction owned by a remote CICS. Read More
What is multitasking and multithreading?
Added on Fri, Nov 27, 2009
Multitasking is the feature supported by the operating
system to execute more than one task simultaneously. Multithreading is
the system environment where the tasks are sharing the same programs
load module under themultitasking environment. It is... Read More
What is the difference between link xctl?
Added on Fri, Nov 27, 2009
Link is temporary transfer of control. Xctl is permanent transfer of control Read More
For a CICS-DB2 program, how is the plan referenced?
Added on Fri, Nov 27, 2009
Uses a RCT table Read More
Name some of the common tables in CICS and their usage?
Added on Fri, Nov 27, 2009
PCT Program Control Table - defines each transaction,
containing a list of valid transaction identifiers (transid) where each
transaction is paired with its matching program PPT Program Processing
Table - contains a list of valid program names and... Read More
What is BMS?
Added on Fri, Nov 27, 2009
BMS is Basic Map Support; it allows you to code assembler level programs to define screens. Read More
Can you use DYNAMIC calls in CICS ?
Added on Fri, Nov 27, 2009
Yes, the called routine must be defined in PPT and the calling program must use CALL identifier. Read More
Are sequential files supported by CICS?
Added on Fri, Nov 27, 2009
Yes, but not as part of the File Control Program. They are supported as extra partition transient data files. Read More
What is the meaning of the SYNCPOINT command?
Added on Fri, Nov 27, 2009
SYNCPOINT without the ROLLBACK option makes all updates
to protected resources permanent, with the ROLLBACK option it reverses
all updates. Read More
Suppose pgm A passes 30 bytes to pgm B thru commarea and pgm B has defined its DFHCOMMAREA to be 50 bytes Is there a problem
Added on Fri, Nov 27, 2009
Yes, if B tries to access bytes 31-50 Read More
How
to build up LU 6.2 communication" and "what Pseudo-conversational and
real conversational transaction are and their differences." ?
Added on Fri, Nov 27, 2009
Pseudo-conversational transactions are almost always the
preferred method. In these mode CICS releases resources between
responses to user input, i.e. the task is ended awaiting the user
response. Read More
Why must all CICS programs have a Linkage Section ?
Added on Fri, Nov 27, 2009
To pass parameters from appl. Program to CICS. Read More
What is MDT? In how many ways it can be Set or Reset?
Added on Fri, Nov 27, 2009
83.What is MDT? In how many ways it can be Set or Reset?
MDT is the last bit in every byte. Modified Data Tag is a 1 bit
attribute character of a BMS field. When it is set on ? CICS will
transmit the data contained in the associated map field... Read More
What are the Skipper & Stopper fields?
Added on Fri, Nov 27, 2009
It is good practice to always skip the cursor to the next
unprotected field after one unprotected field. Skipper is an unlabeled 1
byte field with the auto-skip attribute. DFHMDF
POS=(XX,XX),ATTRB=ASKIP,LENGTH=1 For some important unprotected field...
Read More
How
will you place cursor on a field called ?EMPNO?. This field belongs to
mapset ?MAPEMPG? and map ?MAPEMPM? and Symbolic map ?Empid-Rec?
Added on Fri, Nov 27, 2009
BY INSERTING IC IN THE ATTRIB COMMAND Read More
What are the CICS supplied standard transactions and what for they are used?
Added on Fri, Nov 27, 2009
EDF: Execution Diagnostic Facility ? Monitors the
execution of an application program as an interactive debugging aid. ?
CEDF CECI: Command Level Interpreter ? Performs syntax checking of a
CICS command. If the syntax is satisfied, it will actually... Read More
What is the difference between the MRO & ISC?
Added on Fri, Nov 27, 2009
MRO: Multi-Region Operation. MRO is the mechanism by
which different CICS address spaces with in the same CPU can communicate
and share resources. MRO is communication between a CICS system and
other CICS system in the same processor. ISC:... Read More
Before issuing an ASKTIME command what will be the values in the EIBDATE and EIBTIME fields if the EIB?
Added on Fri, Nov 27, 2009
The date and time at the task initiation Read More
What is the error condition that is set when the file specified in the NAME option is not in the FCT?
Added on Fri, Nov 27, 2009
PGMIDERR Read More
Difference between START & XCTL
Added on Fri, Nov 27, 2009
START command is used to start a transaction at the
specified terminal and at specified time or interval. Optionally data
can be passed to the to-be-initiated transaction. EXEC CICS START
TRANSID(?REP1?) TERMID(?PRT1) TIME(083000) ?R INTERVAL(001500... Read More
What are the parameters that you have to give when you are using the CSSN transaction?
Added on Fri, Nov 27, 2009
None OPNAME N PASSWORD defined in SNT must be provided for the transaction. Read More
NMDS is both device dependent and format dependent (True or False)?
Added on Fri, Nov 27, 2009
True Read More
Reading a record from a TSQ will logically delete the record from the Queue (True or False).?
Added on Fri, Nov 27, 2009
True False Read More
what are the differences between DFHCOMMAREA and TSQ ?
Added on Fri, Nov 27, 2009
Both are used to save data among tasks. But commarea is
private to that transaction only, like every transaction has its own
commarea created by cics as soon as the transaction is initiated .
However TSQ , if QID is known, can be accessed by other... Read More
What is the command that is used to delay the processing of a task for a specified time interval or until a specified time?
Added on Fri, Nov 27, 2009
WAIT WE :CAN USE TWO COMMANDS 1- DELAY 2- POST AND WAIT EVENT COMMANDS Read More
What is the option that is used to erase all unprotected fields during a SEND MAP operation?
Added on Fri, Nov 27, 2009
ERASEAUP Read More
How many ways are there for initiating a transaction?what are they?
Added on Fri, Nov 27, 2009
There are six ways in initiating a transaction.they are
as follows.1. embedding four character transid on the top left most
corner of the screen.2. making use of EXEC CICS START TRANSID ( )3.
making use of EXEC CICS RETURN TRANSID ( ) 4. By defining... Read More
What is ASRA ABEND in CICS?
Added on Fri, Nov 27, 2009
It occurs when program interuption takes place.e.g.: when
alphanumeric string moved to numeric data item OR when arithmetic
calculations performed on nonnumeric data item OR when an attempt made
to read an occurance of a table beyond the defined... Read More
Which is the macro used for making an entry in the PPT ?
Added on Fri, Nov 27, 2009
DFHPPT Read More
What is the primary objective of CICS ?
Added on Fri, Nov 27, 2009
To provide the control and services of the DB/DC system Read More
What is ENQ in CICS?
Added on Fri, Nov 27, 2009
If any one want to restrict Trans-Id to single user,
enter trans-id with ENQ. It won’t allow any one else to use the same
trans-id. Read More
In
SYMBOLIC Cursor Positioning after moving -1 to the length field also
the cursor is not positioned in that particular field. Give reasons?
Added on Fri, Nov 27, 2009
You have to explicitly specify the word CURSOR between your EXEC CICS and END-EXEC in the program. Read More
What command do you issue to delete a record in a transient data queue ?
Added on Fri, Nov 27, 2009
READQ TD, the read is destructive. Yes it is correct but
there is a restriction.U can delete the records sequentially.. For
example if one want to delete 10 th record directly it is not possible
with this. Read More
What are the 3 common ways to create maps?
Added on Fri, Nov 27, 2009
The first way is to code a physical map and then code a
matching symbolic map in your COBOL program. The second way to create a
physical map along with a matching symbolic map is to code only the
physical map using the &SYSPARM option, CICS will... Read More
Which is the command used for terminating a browse operation?
Added on Fri, Nov 27, 2009
ENDBR Read More
What is the difference between a physical BMS mapset and a logical BMS mapset?
Added on Fri, Nov 27, 2009
The physical mapset is a load module used to map the data
to the screen at execution time. The symbolic map is the actual
copybook member used in the program to reference the input and output
fields on the screen. Read More
What is the primary function of the Processing Program Table (PPT)?
Added on Fri, Nov 27, 2009
To register all programs and maps Read More
Sync points cannot be requested by the application programs(True or False).?
Added on Sat, Nov 28, 2009
False Read More
The error code AEIV?
Added on Wed, Nov 25, 2009
This is the error code for length, if length of the source data is more than the receiving field, This error will occur. Read More
What are different ways of Initiating Transaction in CICS?
Added on Wed, Nov 25, 2009
We can initiate CICS Transaction By giving TRANSACTION ID By giving CICS START Command AUTOMATIC TASK INITIATION( ATI). Read More
What is the COMMAREA(communications area) ?
Added on Wed, Nov 25, 2009
This is the area of main storage designed to let programs
or tasks communicate with one another, used in programs via RETURN,
XCTL and LINK commands. Read More
What will be the length of the eibcalen ,if the transaction is used to cics first time?
Added on Wed, Nov 25, 2009
The length will be 0(zero). Read More
What CICS facilities can you use to save data between the transactions?
Added on Wed, Nov 25, 2009
COMMONAREA, TSQ & TDQ. Read More
Are sequential files supported by CICS ?
Added on Wed, Nov 25, 2009
Yes, but not as part of the File Control Program. They are supported as extra partition transient data files. Read More
What do the keywords MAPONLY and DATAONLY mean ?
Added on Wed, Nov 25, 2009
MAPONLY is a SEND MAP operand that sends only fields with
initial values to the screen. DATAONLY is the SEND MAP operand that
specifies only data from the map area should be displayed. Read More
What happens when a CICS command contains the NOHANDLE option?
Added on Wed, Nov 25, 2009
No action is going to be taken for any exceptional
conditional occurring during the execution of this command. The abnormal
condition that occurred will be ignored even if an EXEC CICS HANDLE
condition exist. It has the same effect as the EXEC CICS... Read More
Name three ways the Modified Data Tag can be set on?
Added on Wed, Nov 25, 2009
The Modified Data Tag can be set on: 1. When the user
enters data into the field. 2. When the application program moves
DFHBMFSE to the attribute character. 3. By defining it in the BMS macro
definition. Read More
How would you resolve an ASRA abend?
Added on Wed, Nov 25, 2009
In COBOL II start with CEBR, and get the offset/instruction Read More
What is the function of the Terminal Control table?
Added on Wed, Nov 25, 2009
To register all CICS terminals Read More
TSQs can be written in the Main storage or Auxiliary storage (True or False).?
Added on Thu, Nov 26, 2009
True Read More
what is difference between call and link ?
Added on Thu, Nov 26, 2009
In case of call , whenever you do changes to the called
program you need to compile the calling program also. In case of link ,
it is not needed . Read More
What is meant by a CICS task ?
Added on Thu, Nov 26, 2009
A CICS task exists from the time the operator presses the enter key until the application program returns control to CICS. Read More
What is the common sytsems area (CSA) ?
Added on Thu, Nov 26, 2009
The common systems area is the major CICS control block
that contains system information, including pointers to most other CICS
control blocks. The CSA points to all members of STATIC storage. Read More
The map shown below is displayed with: ?
Added on Thu, Nov 26, 2009
EXEC CICS SEND MAP(’MAP1’) MAPSET(’MAP1S’) MAPONLY
END-EXEC. After the screen is displayed, the operator enters 1
character, the letter ’X’. Where will the cursor now appear on the
screen? MAP1S DFHMSD TYPE=MAP... Read More
What is an mdt (modified data tag) - it’s meaning and use ?
Added on Thu, Nov 26, 2009
The modified data tag is the last bit in the attribute
byte for each screen field. It indicates whether the corresponding
field has been changed. Read More
What is Quasi-reentrancy?
Added on Thu, Nov 26, 2009
There are times when many users are concurrently using
the same program, this is what we call MultiThreading. For example, 50
users are using program A, CICS will provide 50 Working storage for that
program but one Procedure Division. And this... Read More
What are attribute bytes and how and why are they modified ?
Added on Thu, Nov 26, 2009
Attribute bytes define map field characteristics
(brightness, protection, etc); they are modified prior to issuing a SEND
MAP command, eg. from normal to intense to highlight an error field. Read More
What option can be coded on the RETURN command to associate a transaction identifier with the next terminal input ?
Added on Thu, Nov 26, 2009
The TRANSID option. Read More
Once a transient data queue is read, can it be reread ?
Added on Thu, Nov 26, 2009
No, silly! That’s why IBM calls it transient. Read More
What other file control processing commands are used for file updating ?
Added on Thu, Nov 26, 2009
WRITE, REWRITE, DELETE and UNLOCK. Read More
What is the MASSINSERT option ?
Added on Thu, Nov 26, 2009
MASSINSERT is a WRITE option that modifies normal VSAM
split processing, leaving free space after the inserted record, so
subsequent records can be inserted without splits. It is ended by an
UNLOCK command. Read More
What is the SQL Communications Area and what are some of its key fields ?
Added on Thu, Nov 26, 2009
It is a data structure that must be included in any
host-language program using SQL. It is used to pass feedback about the
sql operations to the program. Fields are return codes, error
messages, handling codes and warnings. Read More
What is the significance of RDO ?
Added on Thu, Nov 26, 2009
RDO is Resource Definition Online. Since release 1.6 RDO
allows resources (terminals, programs, transactions and files) to be
defined interactively while CICS is running. Read More
What is CECI ?
Added on Thu, Nov 26, 2009
CECI is the command level interpreter tranid that
interactively executes CICS commands. It is a rudimentary CICS command
debugger which does not require coding an entire program. Read More
What is CEBR ?
Added on Thu, Nov 26, 2009
CEBR lets you browse the contents of a specific temporary storage queue. Read More
Name and explain some common CICS abend codes. ?
Added on Thu, Nov 26, 2009
Any AEI_ indicates an execute interface program problem -
the abending program encountered an exceptional condition that was not
anticipated by the coding. APCT - the program could not be found or is
disabled. ASRA - most common CICS abend,... Read More
What are the CICS commands associated with temporary storage queue processing ?
Added on Thu, Nov 26, 2009
WRITEQ TS, READQ TS, and DELETEQ, whose meanings should be self-explanatory. Read More
What CICS command would you use to read a VSAM KSDS sequentially in ascending order ?
Added on Thu, Nov 26, 2009
READNEXT reads the next record from a browse operation for any of the three VSAM files. Read More
What is the CICS LOAD command ?
Added on Thu, Nov 26, 2009
The LOAD command retrieves an object program from disk
and loads it into main storage - it’s primarily used for a constant
table that will be available system-wide. . Read More
What are the six different types of argument values in COBOL that can be placed in various options of a CICS command?
Added on Thu, Nov 26, 2009
Data Value ? EX (Literal 8 or 77 KEYLEN PIC S9(4) COMP
VALUE 8.) Data Area ? EX (01 RECORD-AREA. 05 FIELD1 PIC X(5). )
Pointer-Ref ? EX (05 POINTER-I PIC S9(8) COMP. ) Name ? EX (05 FILE-NAME
PIC X(5) VALUE ?FILEA?. ) Label ? Cobol paragraph name... Read More
Specify the PIC clause for the following ?
Added on Thu, Nov 26, 2009
Any BLL Cell, Data type of Length Option field HHMMSS
type of data fields Any BLL Cell ? S9(8) COMP Data type of Length Option
field ? S9(4) COMP HHMMSS type of data fields ? S9(7) COMP3 Read More
List the sequence of steps used to achieve ?Modification in Skip Sequential Mode. ?
Added on Thu, Nov 26, 2009
READNEXT command Issue the ENDBR command Issue the READ
command with UDTAE option. Manipulate the record (DELETE or REWRITE
command) Issue START command Issue two READNEXT commands (One for dummy
skip) Go to step two. Read More
What
is the EIB parameter and the CICS command used to implement
Pseudo-Conversational technique using single PCT ? Single PPT entry?
Added on Thu, Nov 26, 2009
EIBCALEN ? To check if COMMAREA has been passed in terurn
command. EXEC CICS RETURN TRANSID(data-name) COMMAREA(data-area)
LENGTH(data-value) END-EXEC Read More
Specify the CICS command used to read a VSAM record starting with prefix ?F?. Code all the relevant options?
Added on Thu, Nov 26, 2009
EXEC CICS READ DATASET(? FILENAME?) INTO(data-area) RIDFLD(data-area) KEYLENGTH(1) GENERIC LENGTH(WK-LEN) END-EXEC. Read More
How to establish a starting position in a browse operation?
Added on Thu, Nov 26, 2009
EXEC CICS STARTBR---------- END-EXEC. Read More
Which
CICS service transaction is used to gain accessibility to CICS control
tables Mention the one that has the highest priority. ?
Added on Thu, Nov 26, 2009
CEDA Read More
What CICS command do you need to obtain the user logon-id?
Added on Thu, Nov 26, 2009
You must code EXEC CICS ASSIGN with the OPERID option. Read More
What is EIB. How it can be used?
Added on Thu, Nov 26, 2009
CICS automatically provides some system-related
information to each task in a form of EXEC Interface Block (EIB), which
is unique to the CICS command level. We can use all the fields of EIB in
our application programs right away. Read More
When a task suspends all the handle conditions via the PUSH command, how does the task reactivate all the handle conditions?
Added on Thu, Nov 26, 2009
By coding an EXEC CICS POP HANDLE command. Read More
Explain re-entrancy as applies to CICS?
Added on Thu, Nov 26, 2009
Reentrant program is a program which does not modify
itself so that it can reenter to itself and continue processing after an
interruption by the operating system which, during the interruption,
executes other OS tasks including OS tasks of the... Read More
How is addressability achieved to the data outside programs working-storage.?
Added on Thu, Nov 26, 2009
The Base Locator for Linkage ( BLL ) is an addressing
convention used to address storage outside the Working Storage Section
of an application program. If BLL is used for the input commands (e.g.:
READ, RECEIVE), it will improve the performance,... Read More
Explain the various ways data can be passed between CICS programs?
Added on Thu, Nov 26, 2009
Data can be passed between CICS programs in three ways-
COMMAREA, TRASIENT DATA QUEUE & TEMPORARY STORAGE QUEUE. Data can be
passed to a called program using the COMMAREA option of the LINK or
XCTL command in a calling program. The called program... Read More
What is MDT?
Added on Thu, Nov 26, 2009
MDT ( Modified Data Tag ) is one bit of the attribute
character. If it is off ( 0 ), it indicates that this field has not been
modified by the terminal operator. If it is on ( 1 ), it indicates
that this field has been modified by the operator. Only... Read More
What is the difference between getting the system time with EIBTIME and ASKTIME command?
Added on Thu, Nov 26, 2009
The ASKTIME command is used to request the current date
and time. Whereas, the EIBTIME field have the value at the task
initiation time. Read More
When
an application is invoked via the EXEC CICS START command with the from
option, how does the application gain access to the common area?
Added on Fri, Nov 27, 2009
An EXEC CICS RETRIEVE command will access the common area. Read More
Name the macros used to define the following:
Added on Fri, Nov 27, 2009
MAP MAPSET FIELD DFHMSD DFHMDI DFHMDF Read More
How do you define Task Work Area?
Added on Fri, Nov 27, 2009
By defining it on the PCT (the Program Control Table) Read More
How is the storage determined in the symbolic map, if you have multiple maps?
Added on Fri, Nov 27, 2009
Storage for maps redefine the first This means largest map has to be the first Read More
What are the steps you go through to a create a BMS executable?
Added on Fri, Nov 27, 2009
Assemble to create CSECT and Link Read More
.Explain the term Function Request Shipping?
Added on Fri, Nov 27, 2009
Function request shipping is one of the CICS modes of
intercommunication which allows an application program in a local CICS
to access resources owned by a remote CICS. Read More
List all the CICS tables and explain their contents?
Added on Fri, Nov 27, 2009
PPT SIT PCT JCT FCT SNT DCT SRT RCT TCT Read More
I have written a CICS program What tables should I setup to run this program?
Added on Fri, Nov 27, 2009
PPT, PCT, (FCT, DCT, RCT (if needed)) Read More
What are different system tables used in CICS?
Added on Fri, Nov 27, 2009
PCT, FCT, TCT, DCT, PPT PCT, FCT, TCT, DCT, PPT Read More
What is the content of the PPT entry?
Added on Fri, Nov 27, 2009
Length, Source, Use count, Lang, Res count DFHRPL number Read More
What is the difference between the enter key, the PF keys and the PA keys?
Added on Fri, Nov 27, 2009
The enter and PF keys transmit data from the screen; the
PA keys tell CICS that a terminal action took place, but data is not
transmitted. Read More
What do the terms locality of reference and working set mean?
Added on Fri, Nov 27, 2009
They refer to CICS efficiency techniques. Locality of
reference requires that the application program should consistently
reference instructions and data within a relatively small number of
pages. The working set is the number of program pages... Read More
Why is it important not to execute a STOP RUN in CICS ?
Added on Fri, Nov 27, 2009
Stop run will come out from the CICS region. Read More
What are the VSAM files used in the CICS Programs?
Added on Fri, Nov 27, 2009
ESDS: Entry Sequenced Data Set KSDS: Key-Sequenced Data Set RRDS: Relative Record Data Set Read More
What are the commands available for browsing VSAM files? What is the sequence of coding these commands in the CICS programs?
Added on Fri, Nov 27, 2009
EXEC STARTBR .. EXEC CICS READ NEXT DATASET(name)
INTO(data-area) RIDFLD (data-area-key) LENGTH(data-value) END-EXEC. EXEC
ENDBR .. Read More
mapset consists of three maps and 10 fields on each map . How many of the following will be needed ?
Added on Fri, Nov 27, 2009
a) DFHMSD statements 1 b) DFHMDI statements 3 c) DFHMDF statements 30 Read More
How are programs reinitiated under CICS ?
Added on Fri, Nov 27, 2009
START COMMAND , RETURN COMMAND Read More
Why doesn?t CICS use the Cobol Open and Close statements ?
Added on Fri, Nov 27, 2009
CICS AUTOMATICALLY OPENS AND CLOSES THE FILES THOSE ARE PLASED IN FCT Read More
What are the macros used in coding the Maps?
Added on Fri, Nov 27, 2009
MAP ? DFHMSD MAPSET ? DFHMDI FIELD ? DFHMDF Read More
What are the CICS Commands used in routing messages to other terminals or printers?
Added on Fri, Nov 27, 2009
The ROUTE command establishes the messages routing
environment but does not send message yet. The next SEND PAGE command
(after the ROUTE) actually sends the message to the destinations. EXEC
ROUTE LIST(data-area) OPCLASS(data-area) INTERVAL(hhmmss)... Read More
What are all the differences between the TDQ & TSQ?
Added on Fri, Nov 27, 2009
CICS Interview Questions and Answers,CICS Faqs,CICS
Interview FAQs and CICS Books,CICS interview ebook,CICS teCICShniCICSal
interview questions,CICS Quiz,CICS Interview Paper,CICS PlaCICSement
Papers,CICS Interview ProCICSedure,CICS Aptitude... Read More
What command is used for committing the data and how it is coded?
Added on Fri, Nov 27, 2009
SYNCPOINT. EXEC CICS SYNC POINT END-EXEC Read More
What is the attribute byte?
Added on Fri, Nov 27, 2009
Defines the display/transmission of field. most cases is an output field from the program. Read More
What is the Master Terminal transaction?
Added on Fri, Nov 27, 2009
CEMT is a CICS supplied transaction which manipulates the
CICS environment, such as transactions, programs, files, TSQ?S and
tasks. CEMT SET ? To update the status of CICS environments CEMT INQUIRE
? To inquire about the status of CICS environment... Read More
What
are the standard copy libraries available for CICS-COBOL programs?
Which of these can be copied to working storage section and with which
command?
Added on Fri, Nov 27, 2009
DFHEIBLK and DFHBMSCA. Using COPY stmt we need include DFHBMSCA in working storage Read More
What are the various types of accesses that can be allowed by the SERVREQ option of the DFHFCT?
Added on Fri, Nov 27, 2009
ADD,BROWSE,DELETE,READ,UPDATE Read More
Which is the AID that will not be identified in the ANYKEY option of the HANDLE AID command?
Added on Fri, Nov 27, 2009
Clear Read More
Which
of the following commands, when issued by 2 different programs running
at the same time, will prevent simultaneous use of resource ’SINGLE’?
Added on Fri, Nov 27, 2009
A) EXEC CICS PROTECT RESOURCE(’SINGLE’) LENGTH(6)
END-EXEC. B) EXEC CICS HOLD RESOURCE(’SINGLE’) LENGTH(6) END-EXEC. C)
EXEC CICS TASK SINGLE(’SINGLE’) LENGTH(6) END-EXEC. D) EXEC CICS
EXCLUSIVE RESOURCE(&rsquo... Read More
The
map shown below is displayed with: EXEC CICS SEND MAP(’MAP1’)
MAPSET(’MAP1S’) MAPONLY END-EXEC.After the screen is displayed, the
operator enters 1 character, the letter ’X’.Where will the cursor now
appear on
Added on Fri, Nov 27, 2009
MAP1S DFHMSD
TYPE=MAP,MODE=INOUT,CTRL=(FREEKB,FRSET),LANG=COBOL, X TIOAPFX=YESMAP1
DFHMDI SIZE=(24,80) DFHMDF POS=(5,1),ATTRB=UNPROT,LENGTH=1FIELD2 DFHMDF
POS=(5,3),ATTRB=UNPROT,LENGTH=1FIELD3 DFHMDF
POS=(5,5),ATTRB=(UNPROT,IC),LENGTH=1FIELD4 DFHMDF... Read More
What
is the CICS command that is used to receive the un-formatted data from
the terminal or logical unit of a communication network?
Added on Fri, Nov 27, 2009
RECEIVE Read More
What is the command for reading a record form a TSQ?
Added on Fri, Nov 27, 2009
READQ TS, READQ Read More
Which is the control table where you specify all the transaction that are to be started by CICS after CICS start-up?
Added on Fri, Nov 27, 2009
Sign-on table Read More
A HANDLE CONDITION remains active until the end of the program or until another HANDLE CONDITION command (True or False) ?
Added on Fri, Nov 27, 2009
True Read More
What is a two Phase commit in CICS?
Added on Fri, Nov 27, 2009
This occurs when a programmer Issues a Exec CICS
Syncpoint command. this is called two phase because CICS will first
commit changes to the resources under its control like VSAM files. and
the DB2 changes are committed.Usually CICS signals DB2 to... Read More
The
goal of a recovery process is to Maintain the integrity of the data
processed by the system and to minimize the impact of a task or system
failure (True or False). ?
Added on Fri, Nov 27, 2009
True Read More
Difference between TSQ & TDQ?
Added on Fri, Nov 27, 2009
TDQ is read destructive, TSQ is not. TSQ can be created
dynamically, TDQ cannot be created dynamically. TSQ is temporary in
nature (i:e it will be deleted when the program finishes execution,
unless it is made permanent by making a entry in the... Read More
What is the CICS supplied transaction which performs syntax checking of a CICS command?
Added on Fri, Nov 27, 2009
CEMT Read More
What does EIB mean?
Added on Fri, Nov 27, 2009
The EIB is the EXECUTIVE INTERFACE BLOCK. It is not the
EXECUTE INTERFACE BLOCK. All TP monitors or transaction processors are
know as EXECUTIVEs as they carry out process on behalf of a program
module. CICS and DB2 are excutives. Read More
What is the process of converting the CICS commands into the equivalent host language statements called?
Added on Fri, Nov 27, 2009
Translation Read More
What is the function of the LOAD command?
Added on Fri, Nov 27, 2009
To fetch a program, table or map to the main storage.
THE " LOAD " COMMAND IS USED TO LOAD A PROGRAM OR A TABLE WHICH IS
INDEPENDENTLY COMPILED OR ASSEMBLED , LINEDITED AND REGISTERED IN PPT .
THIS IS USEFUL FOR LOADING A TABLE DYNAMICALLY. THAT... Read More
What is the CICS Command that is used for reading a record from the TDQ?
Added on Fri, Nov 27, 2009
READQ Read More
What is the command used for receiving a map from a terminal?
Added on Fri, Nov 27, 2009
RECEIVE MAP Read More
What is the difference between the XCTL and LINK commands?
Added on Wed, Nov 25, 2009
The LINK command anticipates return of control to the
calling program, the XCTL command does not. Return to the calling
program will be the result of the CICS RETURN command, specifying
TRANSID(name of the calling program). Read More
LENGERR, NOTAUTH and PGMIDERR are some of the common exception conditions that can occur with LINK and XCTL
Added on Wed, Nov 25, 2009
False Read More
What is the meaning and use of the EIBAID field ?
Added on Wed, Nov 25, 2009
EIBAID is a key field in the execute interface block; it indicates which attention key the user pressed to initiate the task. Read More
What is the difference between pseudo-conversational and conversational?
Added on Wed, Nov 25, 2009
Pseudo-conversational will start a new task for each
input. By coding a CICS RETURN command specifying ? TRANSID(itself).
Conversational will have an active task during the duration of the
data entry. In a conversational mode, the... Read More
What is some of the information available in the EIB area?
Added on Wed, Nov 25, 2009
The cursor position in the map Transaction ID Terminal
ID Task Number Length of communication area Current date and time
Attention identifier Read More
What is Journal Recovery and Dynamic Transaction Backout ?
Added on Wed, Nov 25, 2009
Journal Recovery is recovery of changes made to a file
during online processing. If a file has I/O problems it is restored
from a backup taken before online processing began and the journalled
changes are applied. Dynamic transaction backout is the... Read More
What is the difference between the enter key, the PF keys and the PA keys ?
Added on Thu, Nov 26, 2009
The enter and PF keys transmit data from the screen;
the PA keys tell CICS that a terminal action took place, but data is
not transmitted. Read More
What is temporary storage ?
Added on Thu, Nov 26, 2009
Temporary storage is either main or auxiliary storage that allows the program to save data between task invocations. Read More
What is task control and what are the CICS commands associated with it ?
Added on Thu, Nov 26, 2009
Task control refers to the CICS functions that manage the
execution of tasks. (Elementary, my dear Watson!) Task control commands
are SUSPEND, ENQ, and DEQ Read More
Mention the 5 fields available in the symbolic map for every ?NAMED? field in the DFHMDI macro?
Added on Thu, Nov 26, 2009
FIELD+L - Return the length of text entered (or for
dymanic cursor positioing) FIELD+F - Returns X(80) if data entered but
erased. FIELD+A - Used for attributes reading and setting FIELD+I -
Used for reading the text entered while receiving the map... Read More
Explain
the means of supporting pseudo conversation programming. (E.g. Storing
and restoring of states, control flow, error handling)?
Added on Thu, Nov 26, 2009
When we send a map using SEND MAP command. Immediately we
release the program by using EXEC CICS RETURN command. In this command
we mention the TRANSACTION ID which is to be executed after receiving
the map. In this command we also specify the data... Read More
What is the purpose of the Program List Table?
Added on Thu, Nov 26, 2009
The Program List Table records the set of applications programs that will be executed automatically at CICS start-up time. Read More
What is the function of the Terminal Control Table(TCT)?
Added on Thu, Nov 26, 2009
The TCT defines the characteristics of each terminal with which CICS can communicate. Read More
What is effect on RECEIVE MAP when
Added on Fri, Nov 27, 2009
PF key is pressed? Data transmission may happen, PA key is pressed? Data transmission will not happen Read More
which CICS defined field can you determine the position of the cursor on the map ?
Added on Fri, Nov 27, 2009
ATTRIB FIELD Read More
For multithreading an application program need not be re-entrant(True or False).?
Added on Fri, Nov 27, 2009
True Read More
what is ASRA,How to resolve it
Added on Fri, Nov 27, 2009
ASRA is like SOC7, SOC4 etc. In COBOL II start with CEBR, and get the offset/instruction. Read More
How do you access the records randomly in TSQ ?
Added on Fri, Nov 27, 2009
By specifying the ITEM option Read More
The
mode of achieving conversation with the user, by sending him the
message and while waiting for his response, freeing the system resources
is called?
Added on Fri, Nov 27, 2009
Pseudo-conversation Read More
Question
: What command do you issue to delete a record in a transient data
queue ? Category CICS Interview Questions Rating (0.0) By 0 users
Added on 3/1/2008 Views 123 Rate it!
Added on Fri, Nov 27, 2009
READQ TD, the read is destructive. Yes it is correct but
there is a restriction. You Can delete the records sequentially. For
example if one want to delete 10th record directly it is not possible
with this. Read More
No comments:
Post a Comment